Topic 1 Question 162
You want to archive data in Cloud Storage. Because some data is very sensitive, you want to use the
Trust No One(TNO) approach to encrypt your data to prevent the cloud provider staff from decrypting your data. What should you do?Use gcloud kms keys create to create a symmetric key. Then use gcloud kms encrypt to encrypt each archival file with the key and unique additional authenticated data (AAD). Use gsutil cp to upload each encrypted file to the Cloud Storage bucket, and keep the AAD outside of Google Cloud.
Use gcloud kms keys create to create a symmetric key. Then use gcloud kms encrypt to encrypt each archival file with the key. Use gsutil cp to upload each encrypted file to the Cloud Storage bucket. Manually destroy the key previously used for encryption, and rotate the key once.
Specify customer-supplied encryption key (CSEK) in the .boto configuration file. Use gsutil cp to upload each archival file to the Cloud Storage bucket. Save the CSEK in Cloud Memorystore as permanent storage of the secret.
Specify customer-supplied encryption key (CSEK) in the .boto configuration file. Use gsutil cp to upload each archival file to the Cloud Storage bucket. Save the CSEK in a different project that only the security team can access.
ユーザの投票
コメント(17)
The correct answer must be D A and B can be eliminated immediately since kms generated keys are considered potentially accessible by CSP. C is incorrect because memory store is essentially a cache service.
Additional authenticated data (AAD) acts as a "salt", it is not a cipher.
👍 34dhs2272020/04/01Answer: A Description: AAD is used to decrypt the data so better to keep it outside GCP for safety
👍 12[Removed]2020/03/28The answer is A. In answer D, the security team can access the encryption key stored in the project, the requirement is trust no one.
👍 5squishy_fishy2021/10/08
シャッフルモード